Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

how can you get rid of viruses and trojans for free?

i have critical viruses and trojans i need a software to get rid of them forever !!!!!!!!!!!!!!!!!!!!!

11 Answers

Relevance
  • 1 decade ago
    Favorite Answer

    Follow this instructions to Remove viruses and trojans for free in you Computer.

    Restart You Computer Safe Mode with Networking

    1. Log out and reboot your machine.

    2. When the machine starts the reboot sequence, press the F8 key repeatedly.

    3. Select Safe Mode with Networking from the resulting menu.

    4. Login. If the malware has changed your password, try logging in as

    Administrator. By default, Administrator has no password.

    5. The machine will continue booting, but the Windows desktop will look different.

    Then in The Safe With Networking .Download by using Rkill press here http://www.bleepingcomputer.com/forums/topic308364...

    Download and Scan By Using Malwarebytes’ Anti-Malware http://download.cnet.com/Malwarebytes-Anti-Malware...

    Download and Scan By Using Super Anti-Spyware Press here http://www.superantispyware.com/

    Download ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.

    The main screen allows the user to either clean all temporary files, or select files for cleaning. The program also knows if Firefox and or Opera is being used, and gives the option of cleaning the temporary files associated with those applications.

    ATF Cleaner provides the user with a window showing the total bytes freed upon completion. The program is small (36kb), quick to run and no installation required. to Download ATF Cleaner press this link http://download.cnet.com/ATF-Cleaner/3000-18512_4-...

    Download and Scan By using

    Remove Fake Antivirus 1.64 press here http://www.softpedia.com/progDownload/Remove-Fake-...

    After Finish Scan and Remove all viruses and trojans ,Restart you Computer to be Normal.

    Then

    Download and Scan again By using Norman Malware Cleaner Press here http://www.norman.com/support/support_tools/58732/... This is to make sure you Virus, Malware, Trojan, Worm,

    Rogue Fake Anti-Virus, Hijack Web Browser, Pop up Advertisements,

    Rootkit and Spyware it is not on you Computer Forever.

    Please give me the feedback and Rate Me

  • 5 years ago

    2

    Source(s): Industry Top Antivirus Software - http://moveantivirus.com/?ctZd
  • 1 decade ago

    Here you go, download it, install it, run it. http://www.microsoft.com/security_essentials/

    The viruses/trojans may block the install because the makers of these things are jerks. If that is the case the only way to get rid of what is on your system now is to reinstall Windows. Back up files that you can not replace to external storage, just remember that whatever you have will most likely jump onto the external storage and will try to automatically run when stuck into another computer so be wary! If you have a computer from a major manufacturer you should have a Reinstall disc or a recovery partition on your computer. Most computers allow you to access the recovery partition by hitting F11 or F12 while you are at the very first screen that comes up when you turn your computer on.

    Or you could use a real operating system like Linux. www.ubuntu.com

  • 1 decade ago

    Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.

    Operations which could be performed by a hacker on a target computer system include:

    Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)

    Data Theft (e.g. passwords, security codes, credit card information)

    Installation of software (including other malware)

    Downloading of files

    Uploading of files

    Deletion of files

    Modification of files

    Keystroke logging

    Viewing the user's screen

    http://spyware-chk.com/Trojan/

  • How do you think about the answers? You can sign in to vote the answer.
  • Ed G
    Lv 7
    1 decade ago

    You can go to this link I'm giving you and get free help at the forms. You can also get information on how to remove certain threats. Depending on what you are infected you may have to do a little work.

    http://www.myantispyware.com/2010/08/03/how-to-rem...

  • 1 decade ago

    Try Microsoft Security Essentials. http://www.microsoft.com/security_essentials/

  • Anonymous
    1 decade ago

    I like avast!.

    http://www.avast.com/

    By the way, it is always typed as "avast!". Always lowercase and with the exclamation mark. Even at the beginning, in the middle, or at the end of sentences. Got it? Good.

  • 1 decade ago

    MalwareBytes Anti-Malware

    Spybot Search and Destroy

  • Anonymous
    1 decade ago
Still have questions? Get your answers by asking now.